Threat Actors Hasten Ransomware Cyberattacks on Industrial Control Systems ICS
A Study Shows that Targeting ICS Networks in Operational Plants and Manufacturing Environments Bring Hackers a More Rapid Payment.
Last updated on July 7, 2021
Ransomware attacks are moving forward quickly to target Industrial Control Systems (ICS) endpoints all over the world with a notable increase in activity in the past year.
The Trend Micro research paper, “2020 Report on Threats Affecting ICS Endpoints” calls attention to this dominant trend. The longer these systems are not operational, the more disruption it generates.
The report shows that recent ransomware attacks are just financially stimulated as attacking ICS networks in operational plants and manufacturing environments brings hackers a more rapid payment.
Ryuk, Revil, and LockBit are some of the most popular types of ransomware used by threat actors in order to target ICS networks.
In terms of organizations that have ICSs that have been affected by ransomware, the US has the most ransomware detections impacting ICS, followed by India, Taiwan, and Spain, according to the report.
ICS Latest Ransomware Attacks
Multiple ransomware cyberattacks have been recently noticed targeting major businesses. Such disruption of Operation Systems and Industrial Control Systems (ICS) in major industries has caused grave consequences and loss of huge amounts of money.
On May 24th, WSSC Water has been hit with a ransomware attack where threat actors managed to access internal files but the water quality was not affected in any way.
In June, JBS Foods, the world’s largest meatpacking enterprise, declared that it paid an $11 million ransom to REvil ransomware threat actors following a cyberattack that forced the company to shut down production at several sites worldwide, affecting production facilities from United States, Australia, and Canada.
As a Senior Content Writer and Video Content Creator specializing in cybersecurity, I leverage digital media to unravel and clarify complex cybersecurity concepts and emerging trends. With my extensive knowledge in the field, I create content that engages a diverse audience, from cybersecurity novices to experienced experts. My approach is to create a nexus of understanding, taking technical security topics and transforming them into accessible, relatable knowledge for anyone interested in strengthening their security posture.